Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

security bug

Katie Moussouris: It’s dangerous to conflate bug bounties and vulnerability disclosure

“There are two extremes right now: no idea where to start or do a bug bounty,” says Moussouris, who built Microsoft's vulnerability disclosure program.

securitysmart primary

Security Smart, Winter 2018

From the editors of CSO, Security Smart is a quarterly newsletter ready for distribution in your organization. We combine personal device and home safety tips with organizational security awareness, making security training relevant,...

cloud security ts

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy.

Phishing trends

Review: Keeping the bad phish out of your network pond with Cofense Triage

The tool is still evolving, but even now represents one of the most advanced defenses against phishing.

cloud computing - data center

Review: Protecting clouds with Cloud Defender from Alert Logic

Cloud Defender is a user-friendly tool that lets local IT staff inspect their cloud deployments to look for evidence of hidden threats or breaches. But it can also be used in a SaaS model, with the cybersecurity team at Alert Logic...

allscripts insider pdf primary

Allscripts: Ransomware, recovery, and frustrated customers

The actors behind SamSam launched an attack against Allscripts in January 2018, leaving the company’s customers without access to the services needed to run their medical practices — some for more than a week.

cyber attack

4 open-source Mitre ATT&CK test tools compared

Any of these tools from Endgame, Red Canary, Mitre, and Uber will get your red team and pentesters started with Mitre's ATT&CK framework.

scale balance compare apple os versus windows 10 os

Microsoft Windows 10 vs. Apple macOS: 18 security features compared

Here's how the world's two most popular desktop OSes keep systems and data safe from malware, unauthorized access, hardware exploits and more.

passwords

1.4B stolen passwords are free for the taking: What we know now

The 2012 LinkedIn breach, along with other old third-party breaches, is still paying dividends for criminals, who now have free access to 1.4 billion previously exposed email addresses and passwords.

online hacker

Testing the waters: The value of ethical hacking for business

Why bug bounty programs are on the rise

rules procedures manuals programming language

Review: Intellicta brings issue tracking to compliance rules

The Intellicta Platform from TechDemocracy acts like a security information and event management (SIEM) console, but for compliancy issues. It pulls information from a series of network collectors and correlates that data into a...

European Union [EU] flag-lock on top of a map of Europe
Q&A

Why middle management and the board disagree on GDPR

New Clearswift research suggests a difference in opinion on GDPR preparedness between board members and middle management

fact fiction debunk myths truth

6 myths CEOs believe about security

Want a more effective IT security strategy? Dispel your CEO and senior management of these common cybersecurity misconceptions.

privacy breach - surveilling eye at a digital keyhole in a binary wall

Are you letting GDPR’s privacy rules trump security?

An extreme approach to protecting privacy can actually make personal data less safe. Don’t overreact.

binary code, magnifying lens, skull and crossbones

Review: Bricata adds threat hunting to traditional IPS/IDS

Bricata offers advanced IPS/IDS protection, but also goes a step farther, adding the ability to launch threat hunts based on events, or simply anomalies.

security automation robot protects defends from attack intrusion breach

The future of computer security is machine vs machine

Better security automation at the OS level and via cloud services will force hackers to respond in kind.

hot and cold fire and ice clash temperature

8 hot cyber security trends (and 4 going cold)

What trends do security pros have their eyes on? Their answers run the gamut from tools and technologies to threats, tactics, and training.

futuristic user interface - digital transformation

What is security’s role in digital transformation?

Digital transformation is front of mind for many senior executives, but too often security is left behind.

fog visibility island

Security vs. visibility: Why TLS 1.3 has data center admins worried

A number of data center administrators from large financial, health care and retail corporations have begun to regard the current draft of the 1.3 version of the TLS protocol with increasing alarm. The issue comes down the tussle...

Healthcare professional and security

5 biggest healthcare security threats for 2018

Healthcare continues to be a popular target for ransomware, cryptomining, data theft, phishing, and insider threats.

Load More